Analyzing CyberCrimes Strategies: The Case of Phishing Attack

被引:7
作者
Al Halaseh, Rola [1 ]
Alqatawna, Ja'far [1 ]
机构
[1] Univ Jordan, Web Intelligence Res Grp, King Abdullah Sch Informat Technol 2, Amman, Jordan
来源
2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC) | 2016年
关键词
cyber crime styles; phishing; information security;
D O I
10.1109/CCC.2016.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The growth in technology usage came along with many risks and increase in cybercrimes incidents. Phishing attacks are a form of cybercrimes by which attackers trick victims in order to obtain personal and sensitive information. Phishers motivations include gaining unauthorized information and access, cause financial loss and many more negative impacts. While cybercriminals keep developing their techniques, investigating different attack styles and methodologies are important steps toward developing effective protection mechanisms. This paper contributes to this direction by presenting and analyzing various phishing attack styles including Nigerian, Ghanaian, Chinese and Russian cybercrime styles. Due to richness of learning resources Russians and Chinese were found to be using more advanced techniques than Ghanaians and Nigerians who has limited resources.
引用
收藏
页码:82 / 88
页数:7
相关论文
共 38 条
[1]  
Alqatawna J., 2015, Int. J. Commun. Network Syst. Sci, V8, P118
[2]  
[Anonymous], 2014, NBC News
[3]  
[Anonymous], 2005, SOUPS '05: Proceedings of the 2005 Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania
[4]  
[Anonymous], 2016, 10 THINGS EVERYONE S
[5]  
Aseef N., 2005, CISC VIS NETW IND GL
[6]  
Australian Cyber Security Center, AUSTR CYB SEC THREAT
[7]  
Bergholz A., 2008, CEAS
[8]   New filtering approaches for phishing email [J].
Bergholz, Andre ;
De Beer, Jan ;
Glahn, Sebastian ;
Moens, Marie-Francine ;
Paass, Gerhard ;
Strobel, Siehyun .
JOURNAL OF COMPUTER SECURITY, 2010, 18 (01) :7-35
[9]  
Bizeul D., 2007, RUSSIAN BUSINE UNPUB
[10]  
Cavelty M., 2012, CYB CONFL CYCON 2012